A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability could cause the DHCP service to become nonresponsive.
To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP server. However, the DHCP server must be set to failover mode for the attack to succeed.
The security update addresses the vulnerability by correcting how DHCP failover servers handle network packets.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1206 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-08-14 21:15
Updated : 2024-05-29 17:16
NVD link : CVE-2019-1206
Mitre link : CVE-2019-1206
CVE.ORG link : CVE-2019-1206
JSON object : View
Products Affected
microsoft
- windows_server_2016
- windows_server_2012
- windows_server_2019
CWE
CWE-787
Out-of-bounds Write